Showing 4,961 - 4,980 results of 5,943 for search '"security"', query time: 0.12s Refine Results
  1. 4961
  2. 4962

    A Large-Scale Agricultural Land Classification Method Based on Synergistic Integration of Time Series Red-Edge Vegetation Index and Phenological Features by Huansan Zhao, Chunyan Chang, Zhuoran Wang, Gengxing Zhao

    Published 2025-01-01
    “…Agricultural land classification plays a pivotal role in food security and ecological sustainability, yet achieving accurate large-scale mapping remains challenging. …”
    Get full text
    Article
  3. 4963
  4. 4964

    Eating "rubbish"? Exploring the herbal secrets of "Laji-He," a traditional herbal rice snack from southern China by Renchuan Hu, Qianyun Wang, Zhongxin Duan, Yunan Hu, Kedao Lai, Xiaohui Cai, Ya Peng, Binsheng Luo

    Published 2025-01-01
    “…Preserving and promoting the culture of Laji-He can contribute to enhancing food security and sovereignty at both the local and national levels.…”
    Get full text
    Article
  5. 4965

    Desain Penilaian Risiko Privasi pada Aplikasi Seluler Melalui Model Machine Learning Berbasis Ensemble Learning dan Multiple Application Attributes by R. Ahmad Imanullah Zakariya, Kalamullah Ramli

    Published 2023-08-01
    “…However, not all developers of applications supply detailed information about the app's security aspects, making it difficult for users to assess and understand the risk of privacy breaches they confront. …”
    Get full text
    Article
  6. 4966

    How prepared is Nigeria digital payment for health workers? A landscape analysis by Folashayo Peter Adeniji, David Ayobami Adewole, Segun Bello, Elizabeth Ekirapa, Juliet Aweko, Vincent Michael Kiberu, Charles Opio, Peter Waiswa, Olufunmilayo Ibitola Fawole

    Published 2025-02-01
    “…Challenges of digital payments included: delayed resolution of problems associated with digital payment such as failed transactions, cyber security, double payments, and unfriendly bank policies. …”
    Get full text
    Article
  7. 4967

    The Ethical Challenges of Gamification in Iran: Uncovering the Dark Side by Mona Jami Pour, Hamideh Binaei

    Published 2024-06-01
    “…The extracted categories, in order of priority, include negative mental and physical consequences, access-related challenges, security and privacy challenges, content-related challenges, challenges related to the quality and accuracy of information (information pollution), challenges related to intellectual property rights, and challenges of responsibility and accountability. …”
    Get full text
    Article
  8. 4968

    Personality characteristics of students in the regulation of network activity by S. E. Panshina, N. L. Sungurova, N. B. Karabushchenko

    Published 2021-03-01
    “…The Internet for students is above all a comfortable environment, where it is possible to feel calm and security, to expand social contacts, to find a new experience. …”
    Get full text
    Article
  9. 4969

    Examining future spatiotemporal changes in blue and green water using an enhanced SWAT model: A Jialing River basin case study by Mingyan Wu, Fuquan Ni, Yu Deng, Nan Jiang, Mengyu Zhu, Huazhun Ren, Ziying Yue, Yuxuan Wang

    Published 2025-01-01
    “…Despite the suppression of vegetation activity due to elevated CO2 and high temperatures in future scenarios, increased vegetation growth demands in agricultural areas exacerbate soil water shortages and elevate future risks to water and food security. The findings provide scientific support for comprehensive water resource management of the Jialing River Basin and offer scientific references for water resource allocation and drought response under climate change in the basin.…”
    Get full text
    Article
  10. 4970

    Lithuanian exile press during five decades of soviet ban by Silvija Vėlavičienė

    Published 2024-08-01
    “…The community, established by Soviet institutions for relations with nationals abroad, was under the strict control of national security organizations and was commanded from Moscow. …”
    Get full text
    Article
  11. 4971

    Utilizing the Ethereum blockchain for retrieving and archiving augmented reality surgical navigation data by Sai Batchu, Michael J. Diaz, Lauren Ladehoff, Kevin Root, Brandon Lucke-Wold

    Published 2023-02-01
    “…Aim: Conventional techniques to share and archive spinal imaging data raise issues with trust and security, with novel approaches being more greatly considered. …”
    Get full text
    Article
  12. 4972

    Effects of tropical cyclone Freddy on the social determinants of health: the narrative review of the experience in Malawi by Joseph Okeibunor, Otim Patrick Cossy Ramadan, Ishata Nannie Conteh, Abdou Salam Gueye, Jayne Byakika-Tusiime, Annie Chauma-Mwale, Ebenezer Obi Daniel, Dick Chamla, Fiona Braka, Neema Kimambo Rusibamayila, Chol Thabo Yur, Emmanuel Maurice Ochien, Mathew Kagoli

    Published 2024-07-01
    “…Areas of TCF’s main effects included health, shelter, education, nutrition, water sanitation and hygiene, agriculture and livelihood, transport and logistics including food security. The notable immediate humanitarian responses are donations, camp creation for accommodations, emergency life-saving response and essential healthcare services. …”
    Get full text
    Article
  13. 4973

    An Assessment of Microfinance Institution Services and Performance of Small and Medium Enterprises in Kabale Municipality. by Mugarura, Elijah

    Published 2023
    “…SME Clubs and marketing associations offered personal liability protection, business security, access to capital and resources, created a less competitive business environment, contributed to business networking and offered a collective voice for small business owners. …”
    Get full text
    Thesis
  14. 4974

    Loan Monitoring Costs and Loan Payment in SACCOs: A Case Study of Mitooma People's SACCO in Mitooma Town Council Mitooma District. by Mugarura, Adison

    Published 2024
    “…The study findings revealed that physical verification of the borrower's workplace, physical verification of the borrower's mortgaged property or hypothecated, presentation of collateral security to the SACCO, giving early notifications to the borrower, pledging for the collaterals is another feature of the interest rate in most semi-formal financial institutions and internal auditing were some of loan monitoring techniques used by Mitooma People's SACCO. …”
    Get full text
    Thesis
  15. 4975

    Utilizing A Multi-Stage Transition Model for Analysing Child Stunting in Two Urban Slum Settlements of Nairobi: A Longitudinal Analysis, 2011-2014. by Oduro, Michael S., IddiI, Samuel, Asiedu, Louis, Asiki, Gershim, Kadengye, DamazoT.

    Published 2024
    “…Context-specific interventions targeting the groups of children identified by the socio-demographic factors are needed. Improving food security and exclusive breastfeeding could potentially reduce stunting in the slums.…”
    Get full text
    Article
  16. 4976

    Use of Garden Design to Enhance Mental Health Among the Selected Health Facilities in Kabale Town: A Case Study of Makanga Health Facility. by Nayebare, Maria

    Published 2024
    “…Healing gardens should provide a sense of security and safety, incorporating elements like trees, flowers, fragrant plants, and shrubs to evoke a feeling of hope and relaxation. …”
    Get full text
    Thesis
  17. 4977
  18. 4978

    Presenting the model of social entrepreneurship in the development of rural tourism in the target villages of Gilan province by Fatemeh Doozandeh Ziabari, hamed fallah tafti, Mir Mohammad Asadi, Mahdi Basouli

    Published 2025-02-01
    “…The obtained results showed that the nine main factors affecting the formation of higher education tourism in Iran in order of influence are: dynamic political exchanges with the world at the national level, the existence of macro-national policies in the field of academic interaction, facilitating the process of acceptance in political and administrative dimensions, the existence of economic and technical infrastructures for foreign students, the international language level of faculty members and staff as well as the structure of dynamic and accepting higher education, the existence of a sense of security in social, security and political dimensions for foreign students, and branding factors of universities and introducing historical, cultural and religious attractions to the world.Ratten (2020) in a research comprehensively examined researches in the field of entrepreneurship in tourism and it is noted that it focused on lifestyle and sustainable forms of tourism entrepreneurship without considering emerging technologies and other forms of entrepreneurship like digital and social.Research methodologyThe research method is qualitative and applicable. …”
    Get full text
    Article
  19. 4979
  20. 4980

    A Hybrid Model for Soybean Yield Prediction Integrating Convolutional Neural Networks, Recurrent Neural Networks, and Graph Convolutional Networks by Vikram S. Ingole, Ujwala A. Kshirsagar, Vikash Singh, Manish Varun Yadav, Bipin Krishna, Roshan Kumar

    Published 2024-12-01
    “…Soybean yield prediction is one of the most critical activities for increasing agricultural productivity and ensuring food security. Traditional models often underestimate yields because of limitations associated with single data sources and simplistic model architectures. …”
    Get full text
    Article